Establishing bridges between UML, HAD and GRAFCET Metamodels for the Modelling of Dynamic Systems[Full-Text]M. Nkenlifack, E. Tanyi and F. Fokou

This article shows the scope and limits of UML as a tool for modelling Automatic Control Systems. An alternative metamodel, Hybrid Activity Diagram (HAD), is proposed and applied to a concrete example, in order to illustrate its efficiency in comparison to the limits of UML diagrams. The article also presents bridges which interlink UML, HAD and GRAFCET and establish compatibilities between the three models. Specifications for the development of a HAD simulator and the results obtained from the implementation of the simulator, are also presented in the article.

The microstructure along with the micro-mechanical properties of bone have been extensively observed in this study. It has also been attempted to correlate the mechanical properties with the microstructural aspects. The load deformation pattern of human cortical bone (both male and female) under uniaxial compressive and tensile loading was studied. The physical properties like density and porosity of the whole femur as well as different parts of it was studied to get a mapping of the femur. Microstructure of bone, including the osteon structure, its distribution and its deformation under different stress fields have been thoroughly studied with the help of Scanning electron microscopy and reported here.

The purpose of this study is to synthesize nano-grained Calcium Hydroxyapatite (HAp) through slip casting technique. For this, hydroxyapatite powders were synthesized using two methods, wet chemical method and Ammoniacal method. The as-prepared powders and calcined powders were characterized using XRD, FTIR, to study the phases of the powders. The hydroxyapatite powder calcined at 1000°C for 2hr was used to prepare 50 vol% slurry using DN40 (sodium polyacrylate) as dispersing agent. After slip casting, the green bodies were sintered at different temperatures, 1100, 1200, 1250 and 1300°C with 2hr soaking time. The sintered dense samples were characterized for physical, mechanical and biological behavior.

This paper focuses on the necessity of forest management using the model of control theory. Recent researches in mathematical biology as well as in life sciences closely depend on control theory. Various popular research papers have been received considerable attentions by engineers and research scholars due to the fact that it has been the central and challenging area of research for its wide range applications in the diverse fields. In this study we have briefly mentioned some of the fields in which these challenges are present, specially sustainable forest management is one of the warming issues in the present cencury. Our main objective in this paper is to investigate the scopes and applications of control theory in real life situation, specially the applications of control theory in the efficient and sustainable forest growth. A particular case of Sundarbans, the largest mangrove forest in the world is discussed with illustrative examples.

Parameter reduction from experimental data is an important issue arising in many frequently encountered problems with different types of applications in communications engineering. However, the computational effort grows drastically with the number of parameters in such types of applications. This paper proposes a technique that reduces the performance parameters of a communication system based on eigenvalues of covariance matrix as well as providing a weighted rank of parameters by an approach called non-negative matrix factorization (NMF). The factorization of original matrix provides a weight metric that offers a means of ranking and selecting meaningful important parameters. The relative importance of each parameter is measured from the sequentially ordered eigenvalues. The main aims of this paper are to determine, identify and reduce the reasonable number of performance parameters which will reflect the best measurement system of a describing network scenario.

The trust management approach to distributed system security is developed as an answer to the inadequacy of traditional authorization mechanism. The subjective concept of trust not only enables users to better understand the paradigm of pervasive computing, but also opens new direction of research for solving existing problems such as security, management of online communities or e-services lifecycle .This paper specifies research issues in the areas of authorization and trust in distributed environments involving mobile networks, pervasive and ubiquitous computing networks . We here discuss the notion of trusted computing and examine existing authorization mechanisms and their inadequacies. Next we define a logic program based languages and policies that facilitate the modeling process.To the end various approaches to trust enhanced security for overall authorization security in distributed systems are discussed.

In this paper a Near State Pulse Width Modulation (NSPWM) algorithm with reduced switching frequency is presented for vector controlled induction motor drives for reduced common mode voltage/currents. The proposed algorithm utilizes a group of three neighbor voltage vectors to construct the reference voltage space vector. In the proposed algorithm in each sector any one of the phases is clamped to either positive dc bus or negative dc bus. Hence, the proposed algorithm reduces the switching frequency and switching losses of the inverter. The simulation results illustrate that the proposed NSPWM algorithm results in reduced common mode voltage, has low switching frequency and has low switching losses of the inverter.

Teacher's awareness about the availability and use of technology for Visually Impaired : A study[Full-Text]Prof. Madhuri Isave, Dr. Megha Uplane, Prof. Suresh Isave

This study focuses on, what is the use of technology for VI? What different types of technology available for VI? And how it's useful as a learning resource for VI?People with VI are gaining access to technology and assistive device designed to minimize the effect of their disabilities. Technological advances open up a new world for people with severe visual impairment. These advances give there greater participation and independence in all aspect of modern society. We have noted the technology affects many aspect of life for person with VI. This system is using different mean of input that is visual, auditory and tactile. These devices improve independent learning opportunity and enhanced participation in recreational and leisure time activities.

Huge volume of detailed personal data is regularly collected and sharing of these data is proved to be beneficial for data mining application. Such data include shopping habits, criminal records,medical history, credit records etc .On one hand such data is an important asset to business organization and governments for decision making by analyzing it .On the other hand privacy regulations and other privacy concerns may prevent data owners from sharing information for data analysis. In order to share data while preserving privacy data owner must come up with a solution which achieves the dual goal of privacy preservation as well as accurate clustering result. Trying to give solution for this we implemented vector quantization approach piecewise on the datasets which segmentize each row of datasets and quantization approach is performed on each segment using K means which later are again united to form a transformed data set.Some experimental results are presented which tries to finds the optimum value of segment size and quantization parameter which gives optimum in the tradeoff between clustering utility and data privacy in the input dataset.

This paper presents one simple and novel technique for removal of impulse noise from corrupted image data. The algorithm involves impulse detection followed by spatial filtering of the corrupted pixels. In this method the presence of impulse noise is detected by a simpler method called a fuzzy logic based technique (FLT). However, the filtering idea is to recover the healthy pixel by the help of neighboring pixels. Sometimes the loss of edges or presence of noise makes the image noisy or blurred in appearance. This fuzzy logic filter is presented through 5 stages. (1)A sliding moving window is constructed to check every pixel of the whole image.(2)Two conditional rule are applied according to the averaging value of the neighboring pixels. (3)some membership functions are generated to improve the intensity of pixel value so that it can be distinguishable.(4) A simpler function is developed for better reorganization and removal of noisy data. (5)The resulted matrix appears with suppression of less no of noise. It is shown that FLT is a preferred method of rejecting impulse noise both in terms of computational complexity and lower residual NSR(noise to signal ratio).

Calculation of PID Controller Parameters for Unstable First Order Time Delay Systems[Full-Text]Hamideh Hamidian, Ali Akbar Jalali

In this paper, a numerical approach for the fractional order proportional-integral-derivative controller (FO-PID) design for the unstable first order time delay system is proposed. The controller design is based on the system time delay. In order to obtain the relation between the controller parameters and the time delay, for several amounts of the plant time delay and the fractional derivative and integral orders, the ranges of stabilizing controller parameters are determined. First, for a typical time delay plant and the fractional order controller, the D-decomposition technique is used to plot the stability region(s). The controller derivative gain has been considered as one. By changing the fractional derivative and integral orders, a small amount in each stage, some ranges of proportional and integral gains are achieved which stabilize the system, independent of the fractional l , μ orders. Therefore a set of different controllers for any specified time delay system is obtained. This trend for several various systems with different values of time delay has been done and the proportional and integral gains of the stabilizing controller have been calculated.

Enhanced Mode of Extended Set of Target Fault Techniques in Single Stuck - At Fault for Fault Coverage in Benchmark Circuits[Full-Text]P.Amutha, C.Arun Prasath

The undetectable single stuck-at faults in full-scan benchmark circuits tends to cluster in certain areas. This implies that certain areas may remain uncovered by a test set for single stuck-at faults. The extension to the set of target faults aimed at providing a better coverage of the circuit in the presence of undetectable single stuck-at fault.. The extended set of target faults consists of double stuck-at faults that include an undetectable fault as one of their components. The other component is a detectable fault adjacent to the undetectable fault. Test sets that contain several different tests for each fault (n-detection test sets) are expected to increase the likelihood of detecting defects associated with the sites of target faults. This phenomenon is discerned from the gate level description of the circuit, and it is independent of layout parameters. In addition, the clustering is based on the gate level, and remains valid for any layout of the circuit. The fault simulation and test generation for the extended set of target faults is simulated using modelsim.

Human resources in software development projects require a high level of individual intensity devoted to project tasks, which then is integrated collaboratively to complete the project. Human resources technical skills and implementation experience are key factors for project success and therefore must be allocated and managed judiciously. Despite of the efforts of organizations, problems related to cost escalation have been encountered regularly .Human resource efficiency and productivity shall be key for future success and sustainability of the businesses. Through this paper, the causes have been outlined in a study conducted on software development projects. The reasons outlined affect efficiency and productivity of employees in software development projects across various phases in software development viz. requirement, designing, coding/testing, implementation phase. And it is been devised that job satisfaction enhances when the job is more exploratory in nature.

AES Rijndael is a block cipher developed by NIST as the Advanced Encryption Standard (AES) replacing DES and published as FIPS 197 in November 2001 [5] to address the threatened key size of Data Encryption Standard (DES). AES-Rijndael was developed by Joan Daemen and Vincent Rijmen, Rijndael [4, 5] and was selected from five finalists. Advancement in computation speed every day puts lots of pressure on AES and AES may not with stand attack for longer time. This work focuses on improving security of an encryption algorithm, beyond AES. Though there are various techniques available to enhance the security, an attempt is made to improve the diffusion strength of an algorithm. For enhancing the diffusion power AES Rijndael in MixColumn operation the branch number of MDS matrix is raised from 5 to 9 using a new 8X8 MDS matrix with trade off of speed [8, 9] and implemented on R8C microcontroller.

In this paper, we explore a High-level Data link control published by International Standards Organization (ISO). HDLC is one of the most enduring and fundamental standards in Communications. HDLC is in itself a group of several protocols or rules for transmitting data between network points. The HDLC protocol also manages the flow or pace at which the data is sent. The data is organized into a unit called a frame. HDLC controllers are devices, which executes the HDLC protocol. Some of the key operations of the HDLC protocol implemented are handling bit oriented protocol structure and formatting data as per the packet switching protocol, it includes Transmitting and receiving the packet data serially and providing the data transparency through zero insertion and deletion. This controller generates and detects flags that indicate the HDLC status. The device contains a full duplex transceiver, with independent receive and transmit sections for bit-level HDLC protocol operations. The design is completely Synchronous, with separate clock inputs for receive and transmit allowing the two sections to operate asynchronously. These operations have been implemented using VHDL.